DataBreachToday.com
Privilege in a Hybrid World: Securing Every Identity
2 weeks 5 days ago
Anthropic Accuses China AI Firms of Model Mining
2 weeks 5 days ago
DeepSeek, MoonShot AI, MiniMax Used 24,000 Fake Accounts in Campaign
Anthropic has accused three Chinese AI firms of running coordinated, large-scale operations to steal capabilities from its Claude models. The U.S.-based company said DeepSeek, Moonshot AI and MiniMax are conducting "industrial-scale campaigns" using tens of thousands of fraudulent accounts.
Anthropic has accused three Chinese AI firms of running coordinated, large-scale operations to steal capabilities from its Claude models. The U.S.-based company said DeepSeek, Moonshot AI and MiniMax are conducting "industrial-scale campaigns" using tens of thousands of fraudulent accounts.
Accelerating Enterprise Observability Maturity in 2026
2 weeks 6 days ago
Maturity Improves as Organizations Navigate Cost Pressure, Business Expectations
Enterprise observability has shifted from experimental tooling to critical infrastructure, with 60% of organizations now at mature levels. But cost surprises, business expectations and gaps in business-impact reporting threaten value realization as leaders push for measurable business outcomes.
Enterprise observability has shifted from experimental tooling to critical infrastructure, with 60% of organizations now at mature levels. But cost surprises, business expectations and gaps in business-impact reporting threaten value realization as leaders push for measurable business outcomes.
How Generative AI and OpenTelemetry Transform Observability
2 weeks 6 days ago
Gen AI Nears 98% Adoption as OTel Gains Ground in Production
From automated correlation to agentic AI that investigates and remediates incidents, observability is entering a new phase. With generative AI adoption accelerating and OpenTelemetry gaining production ground, integrated intelligence is becoming table stakes.
From automated correlation to agentic AI that investigates and remediates incidents, observability is entering a new phase. With generative AI adoption accelerating and OpenTelemetry gaining production ground, integrated intelligence is becoming table stakes.
North Korean Hackers Continue to Target US Healthcare
2 weeks 6 days ago
Report: Lazarus Group Pivoting to Medusa Ransomware for Extortion Attacks
North Korean-state backed Lazarus Group hackers are using Medusa ransomware in extortion attacks on U.S. healthcare entities despite a 2024 U.S. indictment of Rim Jong Hyok, an alleged member of the Lazarus subgroup Stonefly, according to a new threat intelligence report.
North Korean-state backed Lazarus Group hackers are using Medusa ransomware in extortion attacks on U.S. healthcare entities despite a 2024 U.S. indictment of Rim Jong Hyok, an alleged member of the Lazarus subgroup Stonefly, according to a new threat intelligence report.
Why Claude Code Security Has Shaken the Cybersecurity Market
2 weeks 6 days ago
How Claude's New AI Code Scanning Tool Will Challenge Application Security Leaders
Anthropic's debut of Claude Code Security jolted cybersecurity stocks and intensified competition in application security testing. It promises deep reasoning around identifying and remediating code vulnerabilities but faces steep challenges matching the feature breadth required by large enterprises.
Anthropic's debut of Claude Code Security jolted cybersecurity stocks and intensified competition in application security testing. It promises deep reasoning around identifying and remediating code vulnerabilities but faces steep challenges matching the feature breadth required by large enterprises.
The Danger of IT, OT, Medical Device Cyber Turf Wars
2 weeks 6 days ago
What often appears to be turf wars between healthcare technology management, facilities OT staff, IT departments and security teams are often the result of unclear ownership and accountability for device security. And that presents safety risks to patients, says Mohammed Waqas, CTO of Armis.
From Click to Compromise: Hardening Browser Risk
2 weeks 6 days ago
Open-Weight AI Models Fail the Jailbreak Test
2 weeks 6 days ago
Cisco: One Prompt May Not Break Most AI Models, But a Conversation Will
Cisco tested eight major open-weight artificial intelligence models and found multi-turn jailbreak attacks succeeded nearly 93% of the time, exposing a blind spot in how enterprises assess and deploy large language models safety.
Cisco tested eight major open-weight artificial intelligence models and found multi-turn jailbreak attacks succeeded nearly 93% of the time, exposing a blind spot in how enterprises assess and deploy large language models safety.
PayPal Ties Small Data Breach and Fraud to App Coding Error
2 weeks 6 days ago
Fintech Giant Says Personal Data Exposed for About 100 Business Users of Loan App
Financial services firm PayPal said it discovered a data breach that lasted for six months, exposed some business customers' personal information and led to fraudulent charges. The company said about 100 customers were affected, and that it has fully refunded them for fraudulent charges.
Financial services firm PayPal said it discovered a data breach that lasted for six months, exposed some business customers' personal information and led to fraudulent charges. The company said about 100 customers were affected, and that it has fully refunded them for fraudulent charges.
Moving From Anomalies to Connections in Fraud Defense
2 weeks 6 days ago
Shared Network Intelligence Adds Ecosystem Visibility to AI Models
Fraudsters collaborate, but most banks still detect fraud alone. This imbalance has defined fraud prevention for years. Now CISOs and fraud practitioners are rethinking their approach using network intelligence signals. Network intelligence shifts the lens by focusing on relationships across banks.
Fraudsters collaborate, but most banks still detect fraud alone. This imbalance has defined fraud prevention for years. Now CISOs and fraud practitioners are rethinking their approach using network intelligence signals. Network intelligence shifts the lens by focusing on relationships across banks.
White House Rolls Out Global AI Initiatives
2 weeks 6 days ago
New Programs Aim to Counter Foreign Influence Over Tech Standards
The White House is operationalizing its AI action plan with export-ready "American AI stack" packages, a U.S. Tech Corps and new standards initiatives, aiming to entrench U.S. infrastructure in allied nations while countering foreign influence over global AI governance.
The White House is operationalizing its AI action plan with export-ready "American AI stack" packages, a U.S. Tech Corps and new standards initiatives, aiming to entrench U.S. infrastructure in allied nations while countering foreign influence over global AI governance.
OnDemand | Why AI Era Attacks Need a Programmatic Approach to CPS Security
3 weeks ago
Anthropic's AI Bug Hunter Jolts Cyber Stocks
3 weeks 1 day ago
AI Code Scanner Rattles a $200B Industry
Anthropic launched Claude Code Security, an AI tool that found 500+ undetected bugs in production code. Cybersecurity stocks dropped sharply, but analysts are split on whether the disruption signals a genuine industry reckoning or a market overreaction.
Anthropic launched Claude Code Security, an AI tool that found 500+ undetected bugs in production code. Cybersecurity stocks dropped sharply, but analysts are split on whether the disruption signals a genuine industry reckoning or a market overreaction.
ISMG Editors: No Honor Among Ransomware Thieves
3 weeks 2 days ago
Also: AI, Machine Identity Risks; Europe’s Digital Sovereignty Push
In this week's panel, four ISMG editors examined how cybercriminals may be turning on each other, what security leaders are really saying about machine identities and AI risk, and how shifting U.S.-Europe dynamics are reshaping technology resilience and digital sovereignty.
In this week's panel, four ISMG editors examined how cybercriminals may be turning on each other, what security leaders are really saying about machine identities and AI risk, and how shifting U.S.-Europe dynamics are reshaping technology resilience and digital sovereignty.
How to Spot a North Korean Job Candidate
3 weeks 2 days ago
Prompt Candidates to Wave, Check IP Addresses and Ask About Their Supposed Location
They're young, tech-savvy and often the most productive remote worker on the team. They're a major security risk numbering in the thousands that a multitude of Fortune 500 companies have unwittingly ushered into their network. They are North Korean IT workers.
They're young, tech-savvy and often the most productive remote worker on the team. They're a major security risk numbering in the thousands that a multitude of Fortune 500 companies have unwittingly ushered into their network. They are North Korean IT workers.
Hospitals at Risk of BeyondTrust Ransomware Hacks
3 weeks 2 days ago
Critical Vulnerability Could Give Attackers Foothold in Clinical Networks
Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a hospital or clinic network.
Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a hospital or clinic network.
Android Malware Taps Google Gemini at Runtime
3 weeks 2 days ago
Researchers Say PromptSpy Automates Persistence on Infected Devices
A newly discovered Android malware strain, "PromptSpy," is using Google's Gemini generative artificial intelligence model to automate part of its persistence mechanism, marking what researchers describe as the second known case of AI-driven mobile malware.
A newly discovered Android malware strain, "PromptSpy," is using Google's Gemini generative artificial intelligence model to automate part of its persistence mechanism, marking what researchers describe as the second known case of AI-driven mobile malware.
Why Banks Need AI-Driven Segmentation Against Ransomware
3 weeks 3 days ago
AI-powered ransomware compresses attacks from weeks to minutes. Michael Villar, director of field security technology at Akamai, says banks need AI-driven segmentation to contain intruders fast, limit lateral movement and protect sensitive data before extortion begins.
Checked
2 hours 53 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed